default search action
4. ICISC 2001: Seoul, Korea
- Kwangjo Kim:
Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings. Lecture Notes in Computer Science 2288, Springer 2002, ISBN 3-540-43319-8 - David Pointcheval:
Practical Security in Public-Key Cryptography. 1-17 - Beomsik Song, Huaxiong Wang, Jennifer Seberry:
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. 18-31 - Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon:
Truncated Differential Cryptanalysis of Camellia. 32-38 - Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang:
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. 39-49 - Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor:
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. 50 - Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi:
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. 51-71 - Dug-Hwan Choi, Seungbok Choi, Dongho Won:
Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm. 72-80 - Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai:
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. 81-102 - Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi:
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. 103-113 - Christopher Krügel, Thomas Toth, Clemens Kerer:
Decentralized Event Correlation for Intrusion Detection. 114-131 - Vorapranee Khu-smith, Chris J. Mitchell:
Enhancing the Security of Cookies. 132-145 - Yang-Seo Choi, Dong-il Seo, Sung Won Sohn:
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. 146-159 - Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang:
Efficient Revocation Schemes for Secure Multicast. 160-177 - Gérard D. Cohen, Simon Litsyn, Gilles Zémor:
Binary Codes for Collusion-Secure Fingerprinting. 178-185 - Jaroslaw Pastuszak, Darek Michalek, Josef Pieprzyk:
Copyright Protection of Object-Oriented Software. 186-199 - Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim:
Off-Line Authentication Using Watermarks. 200-213 - Soichi Furuya:
Slide Attacks with a Known-Plaintext Cryptanalysis. 214-225 - Josef Pieprzyk, Xian-Mo Zhang:
Constructions of Cheating Immune Secret Sharing. 226-243 - Clemente Galdi, Pino Persiano:
Private Computation with Shared Randomness over Broadcast Channel. 244-257 - Nicolás González-Deleito, Olivier Markowitch:
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements. 258-267 - Supakorn Kungpisdan, Yongyuth Permpoontanalarp:
Practical Reasoning about Accountability in Electronic Commerce Protocols. 268-284 - Ron Steinfeld, Laurence Bull, Yuliang Zheng:
Content Extraction Signatures. 285-304 - Dae Hyun Yum, Pil Joong Lee:
New Signcryption Schemes Based on KCDSA. 305-317 - Jinho Kim, Kwangjo Kim, Chulsoo Lee:
An Efficient and Provably Secure Threshold Blind Signature. 318-327 - Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada:
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. 328-340 - André Weimerskirch, Gilles Thonet:
A Distributed Light-Weight Authentication Model for Ad-hoc Networks. 341-354 - Stelvio Cimato:
Design of an Authentication Protocol for Gsm Javacards. 355-368 - Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet:
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. 369-381 - Joan Mir, Joan Borrell:
Protecting General Flexible Itineraries of Mobile Agents. 382-396 - Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon:
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. 397-413 - Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon:
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. 414-427 - Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai:
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. 428-439 - Kouichi Itoh, Masahiko Takenaka, Naoya Torii:
DPA Countermeasure Based on the "Masking Method". 440-456
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.